Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?

Posts created by: Ken Hsu

CVE-2022-22965: Spring Core Remote Code Execution Vulnerability Exploited In the Wild (SpringShell) (Updated)A conceptual image representing a vulnerability, such as CVE-2022-22965, aka SpringShell, discussed here.
107,631
people reacted

CVE-2022-22965: Spring Core Remote Code Execution Vulnerability Exploited In the Wild (SpringShell) (Updated)

  • By Haozhe Zhang, Ken Hsu, Tao Yan, Qi Deng and Robert Falcone
  • March 31, 2022 at 4:30 PM

89

12 min. read

Attackers Conducting Cryptojacking Operation Against U.S. Education Organizations
35,943
people reacted

Attackers Conducting Cryptojacking Operation Against U.S. Education Organizations

  • By Ken Hsu, Vaibhav Singhal and Zhibin Zhang
  • April 8, 2021 at 12:29 PM

18

5 min. read

Trending

  • Hacking Employers and Seeking Employment: Two Job-Related Campaigns Bear Hallmarks of North Korean Threat Actors by Unit 42
  • Stately Taurus Targets the Philippines As Tensions Flare in the South Pacific by Unit 42
  • New Tool Set Found Used Against Organizations in the Middle East, Africa and the US by Samantha Stallings
  • In-Depth Analysis of July 2023 Exploit Chain Featuring CVE-2023-36884 and CVE-2023-36584 by Mike Harbison
  • Exploring a Critical Risk in Google Workspace's Domain-Wide Delegation Feature by Samantha Stallings
Network Attack Trends: Internet of Threats (August-October 2020)The conceptual image represents internet attack trends such as those discussed here, including scanner activities and HTTP directory traversal exploitation attempts.
36,381
people reacted

Network Attack Trends: Internet of Threats (August-October 2020)

  • By Yue Guan, Lei Xu, Ken Hsu and Zhibin Zhang
  • January 22, 2021 at 6:00 AM

34

8 min. read

Two New IoT Vulnerabilities Identified with Mirai PayloadsThis conceptual image illustrates the idea of cybercrime.
37,086
people reacted

Two New IoT Vulnerabilities Identified with Mirai Payloads

  • By Ken Hsu, Yue Guan, Vaibhav Singhal and Qi Deng
  • October 14, 2020 at 12:00 PM

19

5 min. read

Lucifer: New Cryptojacking and DDoS Hybrid Malware Exploiting High and Critical Vulnerabilities to Infect Windows Devices
90,688
people reacted

Lucifer: New Cryptojacking and DDoS Hybrid Malware Exploiting High and Critical Vulnerabilities to Infect Windows Devices

  • By Ken Hsu, Durgesh Sangvikar, Zhibin Zhang and Chris Navarrete
  • June 24, 2020 at 6:00 AM

39

13 min. read

Grandstream and DrayTek Devices Exploited to Power New Hoaxcalls DDoS Botnet
42,093
people reacted

Grandstream and DrayTek Devices Exploited to Power New Hoaxcalls DDoS Botnet

  • By Ken Hsu, Haozhe Zhang, Zhibin Zhang and Ruchna Nigam
  • April 3, 2020 at 1:07 PM

22

7 min. read

New Mirai Variant Targets Zyxel Network-Attached Storage Devices
41,233
people reacted

New Mirai Variant Targets Zyxel Network-Attached Storage Devices

  • By Ken Hsu, Zhibin Zhang and Ruchna Nigam
  • March 19, 2020 at 12:15 PM

27

7 min. read

Attackers Increasingly Targeting Oracle WebLogic Server Vulnerability for XMRig and Ransomware
48,879
people reacted

Attackers Increasingly Targeting Oracle WebLogic Server Vulnerability for XMRig and Ransomware

  • By Ken Hsu, Matthew Tennis, Yanhui Jia, Zhibin Zhang and Durgesh Sangvikar
  • May 3, 2019 at 4:14 PM

17

6 min. read

Popular Resources

  • Resource Center
  • Blog
  • Communities
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Terms of Use
  • Documents

Account

  • Manage Subscriptions
  •  
  • Report a Vulnerability

© 2023 Palo Alto Networks, Inc. All rights reserved.